没有合适的资源?快使用搜索试试~ 我知道了~
基于PKM加密算法的WiMAX安全机制研究毕业论文
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 105 浏览量
2023-11-27
14:57:46
上传
评论
收藏 4.91MB PDF 举报
温馨提示
试读
56页
随着全世界对高速宽带无线通信系统需求的不断增加,IEEE 802.16 作为一种无线城域网的标准,成为了一种宽带无线接入的解决方案,引 起了业界人士的广泛关注,并且已经被国际电信联盟批准为 3G 标准的 新成员。与其它的宽带无线接入技术相比,IEEE 802.16 的优势包括: 大频率范围,高速可变的数据率,点到多点与 Mesh 的通信模式,以及 对不同应用类型的 QoS 支持。 本论文首先分析了当前 WIMAX 标准中的各层通信技术与接入实 现,详细描述并分析了当前 WIMAX 标准中的安全机制,并且提出了自 己的优化建议,软件实现并验证了优化方案。最后对未来标准在安全机 制方面的改进提出了一些个人的看法。
资源推荐
资源详情
资源评论
上海交通大学工学硕士学位论文 基于 PKM 加密算法的 WiMAX 安全机制研究
I
基于 PKM 密钥协议的 WiMAX 安全机制研究
摘 要
随着全世界对高速宽带无线通信系统需求的不断增加,IEEE 802.16
作为一种无线城域网的标准,成为了一种宽带无线接入的解决方案,引
起了业界人士的广泛关注,并且已经被国际电信联盟批准为 3G 标准的
新成员。与其它的宽带无线接入技术相比,IEEE 802.16 的优势包括:
大频率范围,高速可变的数据率,点到多点与 Mesh 的通信模式,以及
对不同应用类型的 QoS 支持。
随着通信技术和新业务的部署,以及市场与技术的相互作用,未来
通信领域一些新的特点逐渐显现出来。一方面,传统宽带固定接入用户
已经不满足于仅仅在家庭和办公室等固定环境内使用宽带业务,希望使
用宽带接入移动服务,另一方面,传统的移动用户也不满足于简单的话
音、短认和低速数据业务,希望能使用更高数据速率的业务。这样固定
宽带接入服务和移动服务在技术和业务上呈现融合的趋势,宽带移动化
和移动宽带化逐渐成为两个领域技术发展的趋势,并互为补充互相促
进。其中 IEEE802.16 WiMAX 就是典型的代表技术,它不仅是宽带移动
的重要里程碑,同时促进了移动宽带的演讲和发展。正是这一原因,宽
带无线接入技术的发展也受到了传统移动通信领域的关注,在未来的移
动通信发展方向上,宽带无线接入技术的特点与移动通信未来演进技术
的特点非常相似。
WiMAX 安全问题自 WiMAX 出现以来引起业界的广泛关注。为了
推进 IEEE 802.16 标准的普及和应用,提供安全保证的安全子层协议栈
上海交通大学工学硕士学位论文 基于 PKM 加密算法的 WiMAX 安全机制研究
II
的软件实现是一项必须进行的工作,然而,这方面的研究显得相对不足。
本论文首先分析了当前 WIMAX 标准中的各层通信技术与接入实
现,详细描述并分析了当前 WIMAX 标准中的安全机制,并且提出了自
己的优化建议,软件实现并验证了优化方案。最后对未来标准在安全机
制方面的改进提出了一些个人的看法。
关键词:WiMAX,安全机制,PKM,MAC 层
上海交通大学工学硕士学位论文 基于 PKM 加密算法的 WiMAX 安全机制研究
III
A RESEARCH OF THE SECURITY MECHANISM ON
WIMAX BASED ON PKM PROTOCOL
ABSTRACT
With the increasing of the demand on high-speed broadband wireless
communication systems all over the world, IEEE 802.16 wireless MAN
standards has aroused widespread concern in the industry as a broadband
wireless access solution, and has been approved as the new member of 3G
ITU standards. Comparing with other broadband wireless access
technologies, the advantages of IEEE 802.16 include: large frequency range,
high-speed variable data rates, point-to-multipoint communications with the
Mesh mode, as well as the different types of application QoS support.
With the deployment of communications technology and new business,
as well as the interaction of the market and technology, some new features of
the future of the telecommunications field gradually emerged. On the one
hand, traditional fixed broadband access has not been satisfied with the mere
users in the home and office environment, such as the use of fixed
broadband services, hopes to use broadband access mobile services, on the
other hand, the traditional mobile users who don't satisfy with a simple voice,
short identify and low-speed data services, hope to use higher data rate
business. This fixed broadband access services and mobile services in the
technical and business integration over the trend of mobile broadband and
mobile broadband gradually become two areas of technology development
trend, complementary and mutually reinforcing. Which IEEE802.16
上海交通大学工学硕士学位论文 基于 PKM 加密算法的 WiMAX 安全机制研究
IV
WiMAX is a typical representative of technology, it is not only an important
milestone in mobile broadband, mobile broadband at the same time
promoting speech and development. It is precisely for this reason that
broadband wireless access technology has been the development of the
traditional field of mobile communications concern, in the future direction of
the development of mobile communications, broadband wireless access
technology and the characteristics of the future evolution of mobile
communication technology have very similar characteristics.
WiMAX security issue has been widespread concern from the industry
since it appeared. In order to promote the popularity of the IEEE 802.16
standards and applications, to provide security guarantees the security of the
sub-layer protocol stack is a software implementation of the work must be
carried out, however, research in this area is relatively short.
This paper analysis of the current WIMAX standards in the access
levels achieved, detailed description and analysis of the current WIMAX
standard security mechanisms, and put forward their own proposal
optimization, software implementation and verify Optimization. Finally,
put forward some personal views on the future standard in the improvement
in the security mechanism.
KEY WORDS: WiMAX,Security Mechanism,PKM,MAC layer
上海交通大学工学硕士学位论文 基于 PKM 加密算法的 WiMAX 安全机制研究
V
目 录
摘 要 ................................................................................................................................... I
ABSTRACT ....................................................................................................................... III
第 1 章 绪论 ........................................................................................................................ 1
1.1 论文研究背景 ················································································· 1
1.2 论文主要工作 ················································································· 1
1.3 论文组织结构 ················································································· 1
第 2 章 WiMAX 系统描述 ................................................................................................. 3
2.1 WiMAX 背景 ·················································································· 3
2.2 WiMAX 的 PHY 层 ··········································································· 5
2.3 WiMAX 的 MAC 层 ·········································································· 7
2.3.1 MAC 汇聚子层的结构与传输 ····················································· 8
2.3.2 MAC 通用部分子层的结构与传输 ··············································· 9
2.3.3 MAC 安全子层 ······································································· 11
2.4 本章小结 ······················································································ 12
第 3 章 入网机制描述 ...................................................................................................... 13
3.1 下行信道扫描与同步 ······································································· 14
3.2 获取上行参数 ················································································ 14
3.3 测距 ···························································································· 14
3.4 协商基本能力 ················································································ 16
3.5 注册和建立 IP 连接 ········································································· 17
3.6 建立服务流 ··················································································· 17
3.7 本章小结 ······················································································ 18
第 4 章 安全密钥机制分析 .............................................................................................. 19
4.1 PKM 协议 ····················································································· 19
4.2 安全关联 ······················································································ 20
4.3 加密算法 ······················································································ 22
4.4 安全子层 ······················································································ 22
4.5 安全机制工作流程 ·········································································· 23
4.6 授权密钥 AK ················································································· 25
4.6.1 AK 生命期 ············································································· 26
剩余55页未读,继续阅读
资源评论
Rocky006
- 粉丝: 6282
- 资源: 1332
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- keil2 + proteus + 8051.exe
- 1961ee27df03bd4595d28e24b00dde4e_744c805f7e4fb4d40fa3f695bfbab035_8(1).c
- mediapipe-0.9.0.1-cp37-cp37m-win-amd64.whl.zip
- windows注册表编辑工具
- mediapipe-0.9.0.1-cp37-cp37m-win-amd64.whl.zip
- 校园通行码预约管理系统20240522075502
- 车类型数据集6250张VOC+YOLO格式.zip
- The PyTorch implementation of STGCN.STGCN-main.zip
- 092300108.cpp
- 车类型数据集6000张VOC+YOLO格式.zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功